共 73 条
[51]
Peeters C., 2022, PROC ACM ASIA C COMP, P2, DOI [10.1145/3488932.3497756, DOI 10.1145/3488932.3497756]
[52]
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites
[J].
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19),
2019,
:181-192
[53]
Redmiles EM, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P89
[54]
"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
[J].
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019),
2019,
:920-934
[55]
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:272-288
[56]
Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:252-270
[58]
SecurityWeek, 2020, Slack Vulnerability Allowed Hackers to Hijack Accounts
[59]
Compromised user credentials detection in a digital enterprise using behavioral analytics
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 93
:407-417
[60]
Shu XK, 2017, Arxiv, DOI arXiv:1701.04940